Page 116 - Cyber Safety C-8
P. 116

1.  Aman shares his friend's photo without permission on social media. Which right under cyber law has
                     Aman violated?
                  2.  Neha wants to sell a software she developed. What part of cyber law will protect her invention?
                  3.  Ravi faces online bullying. Which right under cyber law supports Ravi?


                                                                                            21 st
                                                                                           Century   #Technology Literacy
                                                                                            Skills

                           Learn Cybersecurity with TryHackMe
                           TryHackMe is an interactive online platform that offers hands-on learning in the
                           field of cybersecurity. It provides virtual labs where users can complete step-by-
                           step challenges related to ethical hacking, identifying vulnerabilities, and solving
                           real-world security puzzles.
                           Follow the  steps  given below  to  learn and practice  cybersecurity  in a safe, controlled
                           environment:
                           1.  Type the link: https://tryhackme.com/  into your web browser and press Enter.
























                           2.  On the TryHackMe homepage, click on the Sign Up button.
                           3.  Choose to log in using your Google account.
                           4.  Follow the prompts to create an account if you don’t have one yet.
                           5.   After logging in, you  can browse through various  rooms (virtual labs) that  focus on
                              different aspects of cybersecurity.
                           6.   You can start with beginner-friendly rooms if you are new to hacking or explore more
                              advanced ones if you already have experience.

                           7.   Each room will give you a series of tasks or challenges to complete. These tasks involve
                              identifying  vulnerabilities,  solving  puzzles,  and  practising  ethical  hacking  techniques.
                              Follow the instructions and complete the challenges to progress.
                           8.   As you complete challenges and rooms, you can earn points and badges. Once you finish
                              certain learning paths, you can even earn a certificate of completion to showcase your skills.







                   114  Computer Science - VIII
   111   112   113   114   115   116   117   118   119   120   121